Winning the battle  against blended threats

Posted by Tom Hickman on Oct 23, 2020 8:00:00 AM


Read More

Topics: Web, Application & Hybrid Cloud Security, Threat Intelligence

DDOS attacks and the 2020 election

Posted by Bret Settle on Oct 6, 2020 7:48:50 AM

Ed Amoroso, Chief Executive Officer of TAG Cyber LLC, a global cyber security advisory, training, consulting, and media services company, recently published a great article on the potential for DDOS attacks to disrupt the upcoming election. In it, he gives great insight into how L3/L4 volumetric DDOS works and how they can be used against the facilities that collect and tabulate votes from regional sites. 

Read More

Topics: Threat Intelligence

Prune the Sprawl. Get Better AppSec.

Posted by Gene Fay on Sep 28, 2020 9:55:59 AM

“We are all just prisoners here of our own device. 
--The Eagles  

“Help me get rid of some of this stuff, or I’m gonna f’n lose it.
--Anonymous CISO 

I’m going to go out on a very sturdy limb and say that The Eagles weren’t thinking about cybersecurity when they penned that line in Hotel California. Yet my recent conversations with CIOs and CISOs have made it abundantly clear that many security organizations are facing a similar situation. An excess of security tools has led to out-of-control costs and compounding complexity that makes security inefficient and threatens to make organizations less secure. Instead of stopping threats, many security teams end up like fishermen tangled in their own nets - immobilized and paying extra for the privilege.  

Read More

Topics: Web, Application & Hybrid Cloud Security, Threat Intelligence

Haven't you had your fill of credential stuffing?

Posted by Bret Settle on Sep 16, 2020 8:15:00 AM

Credential stuffing attacks are some of the most common bot-based threats facing applications today. Virtually any site or application with a login page is a potential target for credential stuffing. In this blog, we take a look at what credential stuffing is, how it can impact your apps and users, and how you can use the ThreatX WAAP++ to keep yourself protected.  

Read More

Topics: Threat Intelligence, Company | Product Updates

The Many Faces of Bad Bots

Posted by Gene Fay on Sep 1, 2020 7:45:00 AM

Bad bots and malicious automation are one of the few technology challenges that can materially impact on every business team inside an organization. With up to 50% of Internet traffic generated by bots, organizations are awash in a sea of automated visitors. Some bots are benign, others aren’t. Those that aren't can interfere with customer acquisition. They steal data and intellectual property. They erode application performance. They directly defraud businesses.

Read More

Topics: Web, Application & Hybrid Cloud Security, Threat Intelligence

Five Reasons Agentless AppSec is the Right Choice

Posted by Tom Hickman on Aug 26, 2020 8:45:00 AM


I’m a big fan of the ThreatX agentless architecture. It simplifies many of aspects of deployment and side-steps a lot of the problems with agent-based architecture.

Read More

Topics: Web, Application & Hybrid Cloud Security, Threat Intelligence, Company | Product Updates

Two birds. One stone. Cut costs & Reduce AppSec Risk

Posted by Sean Zoske on Apr 6, 2020 8:45:00 AM

Just a few weeks ago, my colleague wrote a blog about the importance of having AppSec vendors who are true partners and not simply hawkers of products. This has become even more important as security teams try to adapt to the challenges and pressures introduced by the COVID-19 pandemic.

Many organizations are accelerating their migration to cloud-based applications both to reduce costs and to simplify the availability of applications as more users work from home. At the same time, budgets are increasingly uncertain as teams look to control costs in the face of uncertainty. For AppSec teams, this creates a classic need to “do more with less”. While many organizations are being asked to cut back, it is important to remember that attackers are doing just the opposite.

This sort of challenge accentuates the vision behind our approach at ThreatX. This is not a marketing shift to capitalize on a global tragedy, it’s how we built our business from the start. Our approach is simple:

Read More

Topics: Threat Intelligence

Eliminate AppSec Sprawl

Posted by Chris Brazdziunas on Apr 1, 2020 9:15:00 AM


As the threat landscape has become more diverse, AppSec solutions have become increasingly fractured. For each new type of threat or problem, a new corresponding type of security product seems to arise. However, this sort of technology sprawl has become operationally unsustainable as organizations are forced to support exponentially more applications, more APIs, and defend against a much broader set of threats including bots, DDoS attacks, and patient, multi-stage, targeted attacks and evasion techniques. 

Read More

Topics: Threat Intelligence

ThreatX Labs - Blog

Arm yourself with information and insights on the latest cybersecurity trends to defend against today's most advanced cyber criminals with articles from the leader in SaaS-based web application firewall solutions.

Subscribe Here!

Recent Posts

Follow Me